The Cybersixgill actionable alerts check monitors critical assets across the deep, dark, and surface web such as IP addresses, domains, vulnerabilities, and VIPs. Receive alerts with context including severity, threat type, description, post snippet, recommendations, and assessments. This integration provides an out-of-the-box dashboard to prioritize and respond to threats.
To install the Cybersixgill actionable alerts check on your host:
- Install the developer tool on any machine.
- To build the package, run the command:
ddev release build cybersixgill_actionable_alerts
. - Install the Datadog Agent on your host.
- Once the Agent is installed, run the following command to install the integration:
datadog-agent integration install -t datadog-Cybersixgill Actionable Alerts==1.0.0
- Reach out to Cybersixgill Support and request access to the Cybersixgill Developer Platform.
- Receive the welcome email with access to the Cybersixgill developer platform.
- Within the Cybersixgill developer platform, create the Client ID and Client secret.
- Copy the Client ID and Client secret and paste them into the Configuration.yaml file.
- Provide the minimum collection interval in seconds. For example,
min_collection_interval: 3600
Verify that Cybersixgill events are generated in the Datadog Events Explorer.
See service_checks.json for a list of service checks provided by this integration.
This integration sends API-type events to Datadog.
Need help? Contact Cybersixgill support.